Society, Ethics and Professionalism (SEP) SIGCSE TS 2022 DRAFT
While technical issues are central to the computing curriculum, they do not constitute a complete educational program in the broader context. Students must also be exposed to the larger societal context of computing to develop an understanding of the relevant social, ethical, legal and professional issues. This need to incorporate the study of these non-technical issues into the ACM curriculum was formally recognized in 1991, as can be seen from the following excerpt. [Tucker91]:
Undergraduates also need to understand the basic cultural, social, legal, and ethical issues inherent in the discipline of computing. They should understand where the discipline has been, where it is, and where it is heading. They should also understand their individual roles in this process, as well as appreciate the philosophical questions, technical problems, and aesthetic values that play an important part in the development of the discipline.
Students also need to develop the ability to ask serious questions about the social impact of computing and to evaluate proposed answers to those questions. Future practitioners must be able to anticipate the impact of introducing a given product into a given environment. Will that product enhance or degrade the quality of life? What will the impact be upon individuals, groups, and institutions?
Finally, students need to be aware of the basic legal rights of software and hardware vendors and users, and they also need to appreciate the ethical values that are the basis for those rights. Future practitioners must understand the responsibility that they will bear, and the possible consequences of failure. They must understand their own limitations as well as the limitations of their tools. All practitioners must make a long-term commitment to remaining current in their chosen specialties and in the discipline of computing as a whole.
As technological advances continue to significantly impact the way we live and work, the critical importance of social and ethical issues and professional practice continues to increase in importance and consequence; new computer-based products and platforms pose ever more challenging problems each year. It is our students who will enter industry and academia with intentional regard for the identification and resolution of these issues.
Computer science educators may opt to deliver this core and elective material in stand-alone courses, integrated into traditional technical and theoretical courses, dedicated courses, some combination of both, or as special units as part of capstone, project, and professional practice courses. The material in this knowledge area is perhaps best covered through a combination of one required course along with aspects integrated in other technical courses. On the one hand, some topics in knowledge units listed as Core Tier1 may not not readily lend themselves to being covered in other more traditional computer science courses. Without a standalone course, it is difficult to cover these topics appropriately. On the other hand, if social, ethical and professional considerations are covered only in the standalone course and not in the context of other courses, it will reinforce the false notion that technical processes are void of these important issues. Because of this broad relevance, it is important that several traditional courses include aspects such as case studies that analyze the ethical, legal, social and professional considerations in the context of the technical subject matter of the course. Courses in areas such as software engineering, databases, computer graphics, computer networks, information assurance and security, and introduction to computing provide obvious context for analysis of such issues. However, an ethics-related module could be developed for almost any course in the curriculum. It would be explicitly against the spirit of these recommendations to have only a standalone course. Running through all of the issues in this area is the need to speak to the computing practitioner’s responsibility to proactively address these issues by both ethical and technical actions. The ethical issues discussed in any course should be directly related to and arise naturally from the subject matter of that course. Examples include a discussion in a database course of the societal, ethical and professional aspects of data aggregation or data mining, or a discussion in the software engineering course of the potential conflicts between obligations to the customer and obligations to the user and others affected by their work. Programming assignments built around applications such as controlling the movement of a laser during eye surgery by non computer scientists can help to address the social, ethical and professional impacts of computing. Computing faculty who are unfamiliar with the content and/or pedagogy of applied ethics are urged to take advantage of the considerable resources from ACM, IEEE-CS, SIGCAS (ACM Special Interest Group on Computers and Society), and other organizations.
It should be noted that the application of ethical analysis underlies every subsection of this Society, Ethics and Professionalism knowledge area in computing. The ACM Code of Ethics and Professional Conduct1, the IEEE Code of Ethics2, and the AAAI Code of Ethics and Professional Conduct3 provide guidelines and case studies that serve as the basis for the conduct of our professional work. The General Moral Imperatives provide an understanding of our commitment to personal responsibility, professional conduct, and our leadership roles. It falls to computing educators to highlight the domain-specific role of these topics for our students, but programs should certainly be willing to lean heavily on complementary courses from the other humanities and social sciences.
1 www.acm.org/about/code-of-ethics
2 https://www.ieee.org/about/corporate/governance/p7-8.html
3 https://aaai.org/Conferences/code-of-ethics-and-conduct.php
SP. Social Issues and Professional Practice.
[17 Core-Tier1 hours, 14 Core-Tier2 hours]
| 2022 | Core-Tier1 hours | Core-Tier2 hours | Includes Electives |
| SP/Social Context | 3 | 2 | N |
| SP/Tools for Ethical Analysis | 2 | 1 | N |
| SP/Professional Ethics | 2 | 2 | N |
| SP/Intellectual Property | 1 | 1 | Y |
| SP/Privacy and Civil Liberties | 2 | 1 | N |
| SP/Professional Communication | 2 | 1 | N |
| SP/Sustainability | 1 | 1 | Y |
| SP/History | 0 | 1 | Y |
| SP/Economies of Computing | 0 | 0 | Y |
| SP/Security Policies, Laws and Computer Crimes | 2 | 1 | Y |
| SP/Justice. Equity, Diversity and Inclusion | 2 | 3 | N |
| TOTALS | 17 | 14 |
SP/Social Context
[3 Core-Tier1 hour, 2 Core-Tier2 hours]
Computers and the Internet, perhaps more than any other technology, have transformed society over the past several decades, with dramatic increases in human productivity; an explosion of options for news, entertainment, and communication; and fundamental breakthroughs in almost every branch of science and engineering. Social Context provides the foundation for all other SEP knowledge units, especially Professional Ethics. Also see cross-referencing with HCI and NC Knowledge Areas.
Topics:
[Core-Tier1]
- Social implications of computing in a networked world (cross-reference HCI/Foundations/social models; IAS/Fundamental Concepts/social issues)
- Impact of social media on individual well-being, political ideology, and cultural ideology .
- Impact of involving computing technologies, particularly biometric technologies and algorithmic decision-making systems, in civic life (e.g. facial recognition technology, biometric tags, resource distribution algorithms, policing software).
[Core-Tier2]
- Growth and control of the Internet (cross-reference NC/Introduction/organization of the Internet)
- Often referred to as the digital divide, differences in access to digital technology resources and its resulting ramifications for gender, class, ethnicity, geography, and/or underdeveloped countries.
- Accessibility issues, including legal requirements and dark patterns
- Context-aware computing (cross-reference HCI/Design for non-mouse interfaces/ ubiquitous and context-aware)
Learning Outcomes:
[Core-Tier1]
- Describe different ways that computer technology (networks, mobile computing, cloud computing) mediates social interaction at the personal and social group level. [Familiarity]
- Identify developers’ assumptions and values embedded in hardware and software design, especially as they pertain to usability for diverse populations including under-represented populations and the disabled. [Familiarity]
- Interpret the social context of a given design and its implementation. [Familiarity]
- Evaluate the efficacy of a given design and implementation using empirical data. [Assessment]
- Articulate the implications of social media use for different identities, cultures, and communities [Usage]
[Core-Tier2]
- Discuss the internet’s role in facilitating communication between citizens, government, and each other. [Familiarity]
- Analyze the effects of reliance on computing in the implementation of democracy (e.g. delivery of social services, electronic voting). [Assessment]
- Describe the impact of the under-representation of people from historically minoritized populations in the computing profession (e.g., industry culture, product diversity). [Familiarity]
- Explain the implications of context awareness in ubiquitous computing systems. [Familiarity]
- Access to the internet and computing technologies – how this affects different societies. [Familiarity]
- Discuss why/how internet access can be viewed as a human right. [Familiarity]
SP/Tools for Ethical Analysis
[2 Core-Tier1 hours, 1 Core-Tier2 hour]
Ethical theories and principles are the foundations of ethical analysis because they are the viewpoints from which guidance can be obtained along the pathway to a decision. Each theory emphasizes different assumptions and methods for determining the ethicality of a given action. It is important for students to recognize that different decisions in different contexts may require different ethical theories to arrive at the best outcome. Applying tools for ethical analysis requires both an understanding of the underlying principles and assumptions guiding a given tool and an awareness of the social context for that decision. Common ethical principles useful across a variety of situations are rooted in consequentialist, duty-based, agent-centered, and rights-based theories. No theory will be universally applicable to all contexts, nor is any single ethical theory the ‘best.’ Engagement across various ethical schools of thought is important for students to develop the critical thinking needed in judiciously applying tools for ethical analysis of a given situation.
Topics:
[Core-Tier1]
- Avoiding fallacies and misrepresentation in argumentation
- Ethical theories and decision-making (philosophical and social frameworks)
- Cultural assumptions and values
[Core-Tier2]
- Checklists
- Evaluation rubrics
- Stakeholder analysis
- Standpoint theory
Learning Outcomes:
[Core-Tier1]
- Recognize and describe how a given cultural context impacts decision making [Usage]
- Illustrate the use of example and analogy in ethical argument. [Usage]
- Analyze basic logical fallacies in an argument. [Assessment]
- Analyze an argument to identify premises and conclusion. [Assessment]
[Core-Tier2]
- Evaluate all stakeholder positions in a given situation. [Assessment]
- Evaluate ethical/social tradeoffs in technical decisions. [Assessment]
SP/Professional Ethics
[2 Core-Tier1 hours, 2 Core-Tier2 hours]
Computer ethics is a branch of practical philosophy that deals with how computing professionals should make decisions regarding professional and social conduct. There are three primary influences: 1) The individual’s own personal code, 2) Any informal or formal code of ethical behavior existing in the workplace, applicable licensures or certifications, and 3) Exposure to formal codes of ethics. See cross-referencing with the IAS Knowledge Area.
Topics:
[Core-Tier1]
- Community values and the laws by which we live
- The nature of professionalism including care, attention and discipline, fiduciary responsibility, and mentoring
- Keeping up-to-date as a computing professional in terms of familiarity, tools, skills, legal and professional framework as well as the ability to self-assess and progress in the computing field
- Professional certification, codes of ethics, conduct, and practice, such as the ACM/IEEE-CS, SE, AITP, IFIP and international societies (cross-reference IAS/Fundamental Concepts/ethical issues)
- Accountability, responsibility and liability (e.g. software correctness, reliability and safety, as well as ethical confidentiality of cybersecurity professionals)
[Core-Tier2]
- The role of the computing professional in public policy
- Maintaining awareness of consequences
- Ethical dissent and whistle-blowing
- The relationship between regional culture and ethical dilemmas
- Dealing with harassment and discrimination
- Forms of professional credentialing
- Acceptable use policies for computing in the workplace
- Ergonomics and healthy computing environments
- Time to market and cost considerations versus quality professional standards
Learning Outcomes:
[Core-Tier1]
- Identify ethical issues that arise in software design, development practices, and their use [Familiarity]
- Determine how to address ethical issues. [Usage]
- Explain the ethical responsibility of ensuring software correctness, reliability and safety including from where this responsibility arises (e.g. ACM/IEEE/AAAI Codes of Ethics, laws and regulations, organizational policies). [Familiarity]
- Describe the mechanisms that typically exist for a professional to keep up-to-date in ethical matters. [Familiarity]
- Describe the strengths and weaknesses of relevant professional codes as expressions of professionalism and guides to decision-making. [Usage]
- Analyze a global computing issue, observing the role of professionals and government officials in managing this problem. [Assessment]
[Core-Tier2]
- Describe ways in which professionals may contribute to public policy. [Familiarity]
- Describe the consequences of inappropriate professional behavior. [Familiarity]
- Be familiar with whistleblowing and have access to knowledge to guide one through an incident. [Familiarity]
- Provide examples of how regional culture interplays with ethical dilemmas. [Familiarity]
- Discuss forms of harassment and discrimination and avenues of assistance. [Usage]
- Examine various forms of professional credentialing. [Usage]
- Explain the relationship between ergonomics in computing environments and people’s health. [Familiarity]
- Describe issues associated with industries’ push to focus on time to market versus enforcing quality professional standards. [Familiarity]
SP/Intellectual Property
[1 Core-Tier1 hours, 1 Core-Tier2 hour]
Intellectual property refers to a range of intangible rights of ownership in any product of the human intellect, such as a software program. The law provides different methods for protecting these rights of ownership based on their type. There are essentially four types of intellectual property rights relevant to software: patents, copyrights, trade secrets and trademarks. Each affords a different type of legal protection. See cross-referencing with the IM Knowledge Area.
Topics:
[Core-Tier1]
- Philosophical foundations of intellectual property
- Intellectual property rights (cross-reference IM/Information Storage and Retrieval/intellectual property and protection)
- Intangible digital intellectual property (IDIP)
- Legal foundations for intellectual property protection
[Core-Tier2]
- Digital rights management
- Copyrights, patents, trade secrets, trademarks
- Plagiarism
- Foundations of the open source movement
[Elective]
- Software piracy
Learning Outcomes:
[Core-Tier1]
- Discuss the philosophical bases of intellectual property in an appropriate context (e.g. country, etc.). [Familiarity]
- Describe legislation aimed at digital copyright infringements. [Familiarity]
- Critique legislation aimed at digital copyright infringements. [Assessment]
- Identify contemporary examples of intangible digital intellectual property. [Familiarity]
- Justify uses of copyrighted materials. [Assessment]
- Evaluate the ethical issues inherent in various plagiarism detection mechanisms. [Assessment]
[Core-Tier2]
- Interpret the intent and implementation of software licensing. [Familiarity]
- Discuss the issues involved in securing software patents. [Familiarity]
- Characterize and contrast the concepts of copyright, patenting and trademarks. [Assessment]
- Explain the rationale for the legal protection of intellectual property in the appropriate context (e.g. country, etc.). [Familiarity]
[Elective]
- Identify the goals of the open source movement. [Familiarity]
- Identify the global nature of software piracy. [Familiarity]
SP/Privacy and Civil Liberties
[2 Core-Tier1 hours, 1 Core-Tier2 hours]
Electronic information sharing highlights the need to balance privacy protections with information access. The ease of digital access to many types of data makes privacy rights and civil liberties more complex, differing among the variety of cultures worldwide. See cross-referencing with the HCI, IAS, IM and IS Knowledge Areas.
Topics:
[Core-Tier1]
- Privacy implications of widespread data collection for transactional databases, data warehouses, surveillance systems, and cloud computing (cross reference IM/Database Systems/data independence; IM/Data Mining/data cleaning)
- Ramifications of differential privacy
- Technology-based solutions for privacy protection (cross-reference IAS/Threats and Attacks/attacks on privacy and anonymity)
- Civil liberties and cultural differences
[Core-Tier2]
- Philosophical foundations of privacy rights (cross-reference IS/Fundamental Issues/philosophical issues)
- Legal foundations of privacy protection in relevant jurisdictions
- Privacy legislation in areas of practice
- Freedom of expression and its limitations
Learning Outcomes:
[Core-Tier1]
- Evaluate solutions to privacy threats in transactional databases and data warehouses. [Assessment]
- Describe the role of data collection in the implementation of pervasive surveillance systems (e.g., RFID, face recognition, toll collection, mobile computing). [Familiarity]
- Describe the ramifications of differential privacy. [Familiarity]
- Investigate the impact of technological solutions to privacy and security issues (e.g. Differential Privacy). [Usage]
[Core-Tier2]
- Discuss the philosophical basis for the legal protection of personal privacy in an appropriate context (e.g. country, etc.). [Familiarity]
- Critique the intent, potential value and implementation of various forms of privacy legislation. [Assessment]
- Identify strategies to enable appropriate freedom of expression. [Familiarity]
SP/Professional Communication
[2 Core-Tier1 hour, 1 Core-Tier2 hour]
Professional communication conveys information to various audiences who may have very different goals and needs for that information. Effective professional communication of technical information is rarely an inherited gift, but rather needs to be taught in context throughout the undergraduate curriculum. Like most skills, it requires practice. See cross-referencing with HCI and SE Knowledge Areas.
Topics:
[Core-Tier1]
- Interpreting, summarising, and synthesising technical material, including source code and documentation
- Writing effective technical documentation and materials (tutorials, reference materials, API documentation)
- Identifying, describing, and employing (clear, polite, concise) oral, written, and electronic team and group communication. (cross-reference HCI/Collaboration and Communication/group communication; SE/Project Management/team participation)
- Understanding and enacting awareness of audience in communication by communicating effectively with different customers, stakeholders, and leadership
- Utilising collaboration tools (cross-reference HCI/Collaboration and Communication/online communities)
- Recognizing and avoiding the use of rhetorical fallacies when resolving technical disputes.
- Understanding accessibility (cross-reference HCI) and inclusivity requirements for addressing professional audiences.
[Core-Tier2]
- Demonstrate cultural competence in written and verbal communication (cross-reference HCI/User-Centered Design and Testing/cross-cultural evaluation)
- Using synthesis to concisely and accurately convey tradeoffs in competing values driving software projects including technology, structure/process, quality, people, market and financial (cross-reference SE/Software Project Management/Risk)
- Use writing to solve problems or make recommendations in the workplace, such as raising ethical concerns or addressing accessibility issues.
Learning Outcomes:
[Core-Tier1]
- Understand the importance of writing concise and accurate technical documents following well-defined standards for format and for including appropriate tables, figures, and references. [Usage]
- Evaluate written technical documentation for technical accuracy, concision, lack of ambiguity, and awareness of audience. [Assessment]
- Develop and deliver an audience aware, accessible, and organized formal presentation. [Assessment]
- Plan interactions (e.g. virtual, face-to-face, shared documents) with others in ways that invite inclusive participation, model respectful consideration of others’ contributions, and explicitly value diversity of ideas. [Usage]
- Recognize and describe qualities of effective communication (e.g. virtual, face-to-face, shared documents). [Familiarity]
[Core-Tier2]
- Discuss ways to influence performance and results in cross-cultural teams. [Familiarity]
- Evaluate personal strengths and weaknesses to work remotely as part of a team drawing from diverse backgrounds and experiences. [Assessment]
SP/Sustainability
[1 Core-Tier1 hour, 1 Core-Tier2 hour]
Sustainability is defined by the United Nations as “development that meets the needs of the present without compromising the ability of future generations to meet their own needs.” Alternatively it is the “balance between the environment, equity and economy.” (UCLA Sustainability). As computing extends into more and more aspects of human existence, we are already seeing estimates that 10% of global electricity usage is spent on computing, and that percentage seems prone to continue growing. Further, electronics contribute individually to demand for rare earth elements, mineral extraction, and countless e-waste concerns. Students should be prepared to engage with computing with a background that recognizes these global and environmental costs, and their potential long term effects on the environment and local communities.
Topics:
[Core-Tier1]
- Being a sustainable practitioner by taking into consideration environmental, social, and cultural impacts of implementation decisions (e.g. algorithmic bias/outcomes, , economic viability, and resource consumption).
- Explore local/regional/global social and environmental impacts of computing systems use and disposal (e-waste)
- Discuss the tradeoffs involved in proof-of-work and proof-of-stake algorithms.
[Core-Tier2]
- Guidelines for sustainable design standards
- Systemic effects of complex computer-mediated phenomena (e.g. social media, offshoring, remote work)
- Pervasive computing. Information processing that has been integrated into everyday objects and activities, such as smart energy systems, social networking and feedback systems to promote sustainable behavior, transportation, environmental monitoring, citizen science and activism.
- Conduct research on applications of computing to environmental issues, such as energy, pollution, resource usage, recycling and reuse, food management / production, and others.
- How the sustainability of software systems are interdependent with social systems, including the knowledge and skills of its users, organizational processes and policies, and its societal context (e.g. market forces, government policies).
Learning Outcomes:
[Core-Tier1]
- Identify ways to be a sustainable practitioner. [Familiarity]
- For any given project (software artifact, hardware, etc) enumerate the environmental impacts of its deployment. (e.g. energy consumption, contribution to e-waste, impact of manufacturing) [Usage]
- Illustrate global social and environmental impacts of computer use and disposal (e-waste). [Usage]
[Core-Tier2]
- Describe the environmental impacts of design choices within the field of computing that relate to algorithm design, operating system design, networking design, database design, etc. [Familiarity]
- Investigate the social and environmental impacts of new system designs. [Usage]
[Elective]
- Identify guidelines for sustainable IT design or deployment. [Familiarity]
- List the sustainable effects of telecommuting, web shopping, or cryptocurrency mining. [Familiarity]
- Investigate pervasive computing in areas such as smart energy systems, social networking, transportation, agriculture, supply-chain systems, environmental monitoring and citizen activism. [Usage]
- Develop applications of computing and assess through research areas pertaining to environmental issues (e.g. energy, pollution, resource usage, recycling and reuse, food management and production). [Assessment]
SP/History
[0 Core-Tier1 hour, 1 Core-Tier2 hours]
This history of computing is taught to provide a sense of how the rapid change in computing impacts society on a global scale. It is often taught in context with foundational concepts, such as system fundamentals and software development fundamentals. History is important because it provides a mechanism for understanding why our computing systems operate the way they do, the societal contexts in which these approaches arose, and how those continue to echo through the discipline today.
Topics:
[Core-Tier2]
- Age I: Prehistory—the world before ENIAC (1946): Ancient analog computing (Stonehenge, Antikythera mechanism, Salisbury Cathedral clock, etc.), Euclid, Lovelace, Babbage, Gödel, Church, Turing, pre-electronic (electro-mechanical and mechanical) hardware
- Age II: Early modern (digital) computing – ENIAC, UNIVAC, Bombes (Bletchley Park codebreakers), mainframes, etc.
- Age III: Modern (digital) computing – PCs, modern computer hardware (cross-reference AR/Digital logic and digital systems/ history of computer architecture)
- Age IV: Internet – networking, internet architecture, browsers and their evolution, standards, big players (Google, Amazon, Microsoft, etc.), distributed computing.
- Age V: Cloud – smart phones (Apple, Android, and minor ones), cloud computing, remote servers, software as a service (SaaS), security and privacy
Learning Outcomes:
[Core-Tier2]
- Identify significant trends in the history of the computing field. [Familiarity]
- Identify the contributions of several pioneers in the computing field. [Familiarity]
- Discuss the historical context for important moments in history of computing, such as: the move from vacuum tubes to transistors (TRADIC), the first real operating system (OS 360), Xerox PARC and the first Apple computer with a GUI, the creation of specific programming language paradigms, the first computer virus, the creation of the internet, the creation of the WWW, the dot com bust, Y2K, the introduction of smart phones, etc. [Familiarity]
- Compare daily life before and after the advent of personal computers and the Internet. [Assessment]
Notes (BB) https://www.computerhistory.org/
SP/Economies of Computing
[Elective]
The economies of computing are important to those who develop and provide computing resources and services to others as well as society in general. They are equally important to users of these resources and services, both professional and non-professional.
Topics:
- Economies of providers: regulated and unregulated, monopolies and open-market. “Walled Gardens” in tech environments.
- The knowledge and attention economies
- Effect of skilled labor supply and demand on the quality of computing products
- Pricing strategies in the computing domain: subscriptions, planned obsolescence, software licenses, open-source, free software
- Outsourcing and off-shoring software development; impacts on employment and on economics
- Consequences of globalization for the computer science profession and users
- Differences in access to computing resources and the possible effects thereof
- Automation and its effect on job markets, developers, and users
- Economies of scale, startups, entrepreneurship, philanthropy
- How computing is changing personal finance: Blockchain and cryptocurrencies, mobile banking and payments, SMS payment in developing regions, etc.
Learning Outcomes:
- Summarize concerns about monopolies in tech, walled gardens vs open environments, etc. [Familiarity]
- Identify several ways in which the information technology industry and users are affected by shortages in the labor supply. [Familiarity]
- Identify the evolution of pricing strategies for computing goods and services. [Familiarity]
SP/Security Policies, Laws and Computer Crimes
[2 Core-Tier1 hours, 1 Core-Tier2 hour]
While security policies, laws and computer crimes are important, it is essential they are viewed with the foundation of other Social and Professional knowledge units, such as Intellectual Property, Privacy and Civil Liberties, Social Context, and Professional Ethics. Computers and the Internet, perhaps more than any other technology, have transformed society over the past 75 years. At the same time, they have contributed to unprecedented threats to privacy; new categories of computer crime and anti-social behavior; major disruptions to organizations; and the large-scale concentration of risk into information systems. See cross-referencing with the HCI and IAS Knowledge Areas.
Topics:
- Examples of computer crimes and legal redress for computer criminals (cross-reference IAS/Digital Forensics/rules of evidence)
- Social engineering, computing-enabled fraud, and recovery (cross-reference HCI/Human Factors and Security/trust, privacy and deception)
- Identify what constitutes computer crime, such as Issues surrounding the misuse of access and breaches in security
- Motivations and ramifications of cyber terrorism and criminal hacking, “cracking”
- Effects of malware, such as viruses, worms and Trojan horses
- Crime prevention strategies
- Security policies (cross-reference IAS/Security Policy and Governance/policies)
Learning Outcomes:
- List classic examples of computer crimes and social engineering incidents with societal impact. [Familiarity]
- Identify laws that apply to computer crimes. [Familiarity]
- Describe the motivation and ramifications of cyber terrorism and criminal hacking. [Familiarity]
- Examine the ethical and legal issues surrounding the misuse of access and various breaches in security. [Usage]
- Discuss the professional’s role in security and the trade-offs involved. [Familiarity]
- Investigate measures that can be taken by both individuals and organisations including governments to prevent or mitigate the undesirable effects of computer crimes and identity theft. [Usage]
- Write a company-wide security policy, which includes procedures for managing passwords and employee monitoring. [Usage]
SEP/Justice, Equity, Diversity, and Inclusion
[2 Core-Tier1 hours, 3 Core-Tier2 hours]
Computer Science has had—since its inception as a field—a diversity problem. Despite being a creative, highly compensated field with myriad job opportunities; people of color and women are vastly underrepresented. For too many students who intend to major in computer science, their first computer science course is their last course. There are many factors that contribute to the lack of representation of diverse identities within computer science, and there is no single, quick fix to this problem. Explicitly addressing diversity, equity and inclusion across the computer science curriculum demonstrates its importance for the department, institution, and the field—all of which likely have a DEI statement and/or initiative.
Topics:
[Core-Tier1]
- Identity and inclusion in computer science in both academia and industry
- Social benefits of diversity and the social cost of a lack of diversity
- Inclusive language and charged terminology, and why their use matters
[Core-Tier 2]
- Highlight experts (practitioners, graduates, and upper level students) who reflect the identities of the classroom and the world
- Economic benefits of diversity and the economic cost of a lack of diversity
- Equity and equality
Learning Outcomes:
[Core-Tier1]
- What language, practices, and behaviors makes someone feel included in a workplace and/or a team and why is it relevant.
- Avoid charged terminology, see Words Matter (https://www.acm.org/diversity-inclusion/words-matter).
- Work collegially and respectfully with team members who do not share your identity.
- Distinguish between equity and equality.
[Core-Tier 2]
- Compare the demographics of your institution’s computer science and STEM majors to the overall institutional demographics.
- Identify developers’ assumptions and values embedded in hardware and software design, especially as they pertain to usability by diverse populations including under-represented populations and the differently-abled.
- Describe the impact of diversity and under-representation of identities in the computing profession (e.g., industry culture, product diversity, and profitability).
Desirable Professional Dispositions
Professional dispositions are part of the competency model promised in our vision statement. Professional dispositions are “cultivated behaviors” desirable in the workplace. They are malleable and observable. The dispositions listed in earlier curricular volumes include:
- Proactive: take initiative, self-starter, independent
- Self-directed: self-learner, self-motivated
- Goal-driven
- Professional: exercise discretion, behave ethically
- Responsible: Act appropriately
- Adaptable: Flexible
- Collaborative: team player
- Responsive
- Meticulous: attentive to detail, thorough
- Inventive: look beyond simple solutions
This is not a comprehensive list. Please feel free to add your own, e.g., “Follow instructions” is important for beginning programmers. Professional dispositions differ from skills in that they involve willingness and agency, e.g., it is not sufficient for one to have the skills to collaborate with others. One must also have the willingness to collaborate, the latter being a disposition.
The most desirable professional dispositions for this knowledge area are:
- Professional – Relatively little in the practice of computing is entirely independent – we rely on others extensively, whether that is in the form of teamwork, customer relationships, leadership roles, academic research, etc. Being able to interact with others, regardless of identity, background, etc, is essential to success for both individuals and the industry as a whole.
- Responsible – Responsibility, attention to detail, and general awareness of potential social impact are highly desirable for computing graduates.
- Critically Self-reflective – Being able to inspect one’s own actions, thoughts, and motives will help in discovering places where professional activity is not up to current standards.
- Responsive – Ability to quickly and accurately respond to changes in the field and adapt in a professional manner, such as shifting from in-person office work to remote work at home. These shifts require us to rethink our entire approach to what is considered “professional.”
- Proactive – Being professional in the workplace means finding new trends (e.g. in accessibility or inclusion) and understanding how to implement them immediately for a more professional working environment.
SDF/Subcommittee
The subcommittee for SDF is:
- Brett A. Becker, University College Dublin, Ireland (Chair)
- Richard L. Blumenthal, Regis University, CO, USA
- Michael Goldweber, Xavier University, Cincinnati, OH, USA
- James Prather, Abilene Christian University, TX, USA
- Susan Reiser, University of North Carolina Asheville, NC, USA
- Michelle Trim, University of Massachusetts Amherst, MA, USA
- Titus Winters, Google, Inc, New York, NY, USA
Other Contributors:
- Johanna Blumenthal, Esq. Regis University, USA
- MaryAnne Egan, Siena College, NY, USA
- Keith Quille, Technological University of Dublin, Ireland
- Mehran Sahami, Stanford University, CA, USA
- Mark Scanlon, University College Dublin, Ireland
- Karren Shorofsky, University of San Francisco School of Law, CA, USA
- Ellen Walker, Hiram College, OH, USA